Home
last modified time | relevance | path

Searched refs:tagAead (Results 1 – 25 of 28) sorted by relevance

12

/base/security/huks/test/unittest/huks_standard_test/crypto_engine_test/src/
Dhks_crypto_hal_api_openssl.cpp154 HksBlob tagAead = { .size = 0, .data = nullptr }; variable
157 ret = HksCryptoHalEncrypt(&key, nullptr, &message, &cipherText, &tagAead);
161 ret = HksCryptoHalEncrypt(&key, nullptr, &message, &cipherText, &tagAead);
165 ret = HksCryptoHalEncrypt(&key, nullptr, &message, &cipherText, &tagAead);
169 ret = HksCryptoHalEncrypt(&key, nullptr, &message, &cipherText, &tagAead);
172 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherText, &tagAead);
224 HksBlob tagAead = { .size = 1, .data = buff }; variable
226 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherText, &tagAead);
230 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherText, &tagAead);
234 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherText, &tagAead);
[all …]
Dhks_crypto_hal_aes_cipher.cpp493 struct HksBlob *encryptOut, struct HksBlob *tagAead) in RunTestEncrypt() argument
531 … EXPECT_EQ(HksCryptoHalEncryptFinal(&enMessageLast, &encryptCtx, &enMessageLastOut, tagAead, in RunTestEncrypt()
547 … EXPECT_EQ(HksCryptoHalEncryptFinal(&enMessageLast, &encryptCtx, &enMessageLastOut, tagAead, in RunTestEncrypt()
554 struct HksBlob *tagAead, struct HksBlob *decryptOut) in RunTestDecrypt() argument
588 EXPECT_EQ(HksCryptoHalDecryptFinal(&messageLast, &decryptCtx, &messageLastOut, tagAead, in RunTestDecrypt()
605 … EXPECT_EQ(HksCryptoHalDecryptFinal(&deMessageLast, &decryptCtx, &messageLastOut, tagAead, in RunTestDecrypt()
626 HksBlob tagAead = { .size = AEAD_SIZE, .data = (uint8_t *)HksMalloc(AEAD_SIZE) }; in RunTestCaseThreeStage() local
629 ASSERT_EQ(tagAead.data == nullptr || encryptAll.data == nullptr || in RunTestCaseThreeStage()
634 RunTestEncrypt(&key, testCaseParams, &message, &encryptAll, &tagAead); in RunTestCaseThreeStage()
637 RunTestDecrypt(testCaseParams, &key, &encryptAll, &tagAead, &decryptAll); in RunTestCaseThreeStage()
[all …]
Dhks_crypto_hal_aes_encrypt.cpp349 struct HksBlob *encryptOut, struct HksBlob *tagAead) const in RunTestEncrypt()
385 … EXPECT_EQ(HksCryptoHalEncryptFinal(&enMessageLast, &encryptCtx, &enMessageLastOut, tagAead, in RunTestEncrypt()
398 EXPECT_EQ(HksCryptoHalEncryptFinal(&enMessageLast, &encryptCtx, encryptOut, tagAead, in RunTestEncrypt()
423 HksBlob tagAead = { .size = AEAD_SIZE, .data = (uint8_t *)HksMalloc(AEAD_SIZE) }; in RunTestCase() local
425 ASSERT_EQ(tagAead.data == nullptr, false) << "tagAead malloc failed."; in RunTestCase()
428 RunTestEncrypt(&key, testCaseParams, &message, &cipherText, &tagAead); in RunTestCase()
430 … EXPECT_EQ(HksCryptoHalEncrypt(&key, &testCaseParams.usageSpec, &message, &cipherText, &tagAead), in RunTestCase()
437 HksFree(tagAead.data); in RunTestCase()
Dhks_crypto_hal_api_mbedtls.cpp134 HksBlob tagAead = { .size = 0, .data = nullptr }; variable
137 ret = HksCryptoHalEncrypt(&key, nullptr, &message, &cipherText, &tagAead);
141 ret = HksCryptoHalEncrypt(&key, nullptr, &message, &cipherText, &tagAead);
145 ret = HksCryptoHalEncrypt(&key, nullptr, &message, &cipherText, &tagAead);
149 ret = HksCryptoHalEncrypt(&key, nullptr, &message, &cipherText, &tagAead);
152 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherText, &tagAead);
204 HksBlob tagAead = { .size = 1, .data = buff }; variable
206 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherText, &tagAead);
210 ret = HksCryptoHalEncrypt(&key, &spec, &message, &cipherText, &tagAead);
Dhks_crypto_hal_aes_decrypt.cpp366 struct HksBlob *decryptOut, struct HksBlob *tagAead) const in RunTestAesDecrypt()
398 EXPECT_EQ(HksCryptoHalDecryptFinal(&messageLast, &decryptCtx, &outLast, tagAead, in RunTestAesDecrypt()
409 EXPECT_EQ(HksCryptoHalDecryptFinal(&deMessageLast, &decryptCtx, decryptOut, tagAead, in RunTestAesDecrypt()
417 struct HksBlob *decryptOut, struct HksBlob *tagAead) const in RunTestAesGcmDecrypt()
446 EXPECT_EQ(HksCryptoHalDecryptFinal(&messageLast, &decryptCtx, &outLast, tagAead, in RunTestAesGcmDecrypt()
456 EXPECT_EQ(HksCryptoHalDecryptFinal(&deMessageLast, &decryptCtx, decryptOut, tagAead, in RunTestAesGcmDecrypt()
Dhks_crypto_hal_rsa_encrypt.cpp488 HksBlob tagAead = { .size = 0, .data = nullptr }; in RunTestCase() local
490 … EXPECT_EQ(HksCryptoHalEncrypt(&key, &testCaseParams.usageSpec, &message, &cipherText, &tagAead), in RunTestCase()
/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/include/
Dhks_mbedtls_aes.h38 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead);
50 struct HksBlob *tagAead, const bool encrypt);
Dhks_mbedtls_rsa.h38 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead);
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/include/
Dhks_openssl_sm4.h38 struct HksBlob *tagAead);
45 struct HksBlob *tagAead);
Dhks_openssl_aes.h43 struct HksBlob *tagAead);
50 struct HksBlob *tagAead);
55 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead);
Dhks_openssl_rsa.h41 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead);
/base/security/huks/frameworks/huks_standard/main/crypto_engine/mbedtls/src/
Dhks_mbedtls_aes.c540 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead) in AesEncryptGcm() argument
564 tagAead->size, in AesEncryptGcm()
565 tagAead->data); in AesEncryptGcm()
569 (void)memset_s(tagAead->data, tagAead->size, 0, tagAead->size); in AesEncryptGcm()
643 struct HksBlob *tagAead) in AesEncryptGcmFinal() argument
668 …ret = mbedtls_gcm_finish(gcmCtx, tagAead->data, tagAead->size, &size, tagAead->data, tagAead->size… in AesEncryptGcmFinal()
671 (void)memset_s(tagAead->data, tagAead->size, 0, tagAead->size); in AesEncryptGcmFinal()
782 struct HksBlob *cipherText, struct HksBlob *tagAead) in AesDecryptGcmFinal() argument
808 … ret = mbedtls_gcm_finish(gcmCtx, check_tag, tagAead->size, &size, check_tag, tagAead->size); in AesDecryptGcmFinal()
819 for (diff = 0, i = 0; i < tagAead->size; i++) { in AesDecryptGcmFinal()
[all …]
Dhks_mbedtls_engine.c263 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead) in HksCryptoHalEncrypt() argument
270 return func(key, usageSpec, message, cipherText, tagAead); in HksCryptoHalEncrypt()
298 struct HksBlob *tagAead, const uint32_t algtype) in HksCryptoHalEncryptFinal() argument
310 return func(ctx, message, cipherText, tagAead, true); in HksCryptoHalEncryptFinal()
359 struct HksBlob *tagAead, const uint32_t algtype) in HksCryptoHalDecryptFinal() argument
371 return func(ctx, message, cipherText, tagAead, false); in HksCryptoHalDecryptFinal()
Dhks_mbedtls_rsa.c319 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead) in HksMbedtlsRsaEncrypt() argument
321 (void)tagAead; in HksMbedtlsRsaEncrypt()
/base/security/huks/frameworks/huks_standard/main/crypto_engine/openssl/src/
Dhks_openssl_aes.c373 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead) in OpensslAesAeadEncryptFinal() argument
397 …if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, HKS_AE_TAG_LEN, tagAead->data) != HKS_OPENSSL_… in OpensslAesAeadEncryptFinal()
564 struct HksBlob *cipherText, struct HksBlob *tagAead) in OpensslAesAeadEncryptFinalGCM() argument
595 …if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, HKS_AE_TAG_LEN, tagAead->data) != HKS_OPENSSL_… in OpensslAesAeadEncryptFinalGCM()
610 struct HksBlob *plainText, struct HksBlob *tagAead) in OpensslAesAeadDecryptFinalGCM() argument
635 if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_SET_TAG, tagAead->size, tagAead->data) != in OpensslAesAeadDecryptFinalGCM()
637 HKS_LOG_E("EVP_CIPHER_CTX_ctrl failed, tagAead->size->%" LOG_PUBLIC "d", tagAead->size); in OpensslAesAeadDecryptFinalGCM()
826 struct HksBlob *tagAead) in HksOpensslAesEncryptFinal() argument
835 ret = OpensslAesAeadEncryptFinalGCM(cryptoCtx, message, cipherText, tagAead); in HksOpensslAesEncryptFinal()
912 struct HksBlob *tagAead) in HksOpensslAesDecryptFinal() argument
[all …]
Dhks_openssl_sm4.c143 struct HksBlob *tagAead) in HksOpensslSm4EncryptFinal() argument
145 (void)(tagAead); // sm4 do not support CCM or GCM, therefore tag is not used in HksOpensslSm4EncryptFinal()
213 struct HksBlob *tagAead) in HksOpensslSm4DecryptFinal() argument
Dhks_openssl_engine.c380 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead) in HksCryptoHalEncrypt() argument
387 return func(key, usageSpec, message, cipherText, tagAead); in HksCryptoHalEncrypt()
421 struct HksBlob *tagAead, const uint32_t algtype) in HksCryptoHalEncryptFinal() argument
433 return func(ctx, message, cipherText, tagAead, true); in HksCryptoHalEncryptFinal()
485 struct HksBlob *tagAead, const uint32_t algtype) in HksCryptoHalDecryptFinal() argument
497 return func(ctx, message, cipherText, tagAead, false); in HksCryptoHalDecryptFinal()
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/include/
Dopenssl_aes_helper.h40 const struct HksBlob *randomKey, const struct HksBlob *tagAead);
/base/security/huks/frameworks/huks_standard/main/common/include/
Dhks_crypto_adapter.h46 struct HksBlob *tagAead);
Dhks_crypto_hal.h227 struct HksBlob *tagAead, const uint32_t algtype);
232 const struct HksBlob *message, struct HksBlob *cipherText, struct HksBlob *tagAead);
240 struct HksBlob *tagAead, const uint32_t algtype);
/base/security/huks/frameworks/huks_standard/main/common/src/
Dhks_crypto_adapter.c209 …ParamSet *paramSet, const struct HksBlob *inData, struct HksBlob *outData, struct HksBlob *tagAead) in HksGetEncryptAeTag() argument
217 tagAead->data = NULL; in HksGetEncryptAeTag()
218 tagAead->size = 0; in HksGetEncryptAeTag()
227 tagAead->data = outData->data + inData->size; in HksGetEncryptAeTag()
228 tagAead->size = HKS_AE_TAG_LEN; in HksGetEncryptAeTag()
/base/security/huks/test/unittest/huks_standard_test/interface_inner_test/alg_module_test/src/
Dhks_aes_key_mt.cpp469 HksBlob tagAead = { .size = AAD_SIZE, .data = (uint8_t *)HksMalloc(AAD_SIZE) }; in RunTestCase() local
470 ASSERT_NE(tagAead.data, nullptr); in RunTestCase()
471 EXPECT_EQ(AesGcmEncrypt(paramInSet, &plainText, &cipherText, &symmetricKey, &tagAead), in RunTestCase()
473 … EXPECT_EQ(AesGcmDecrypt(paramInSet, &cipherText, &plainTextDecrypt, &symmetricKey, &tagAead), in RunTestCase()
475 HksFree(tagAead.data); in RunTestCase()
Dhks_aes_encrypt_mt.cpp472 HksBlob tagAead = { .size = AAD_SIZE, .data = (uint8_t *)HksMalloc(AAD_SIZE) }; in RunTestCase() local
473 ASSERT_NE(tagAead.data, nullptr); in RunTestCase()
474 (void)memcpy_s(tagAead.data, AAD_SIZE, cipherText.data + AAD_SIZE, AAD_SIZE); in RunTestCase()
476 … EXPECT_EQ(AesGcmDecrypt(paramInSet, &cipherText, &plainTextDecrypt, &authId, &tagAead), in RunTestCase()
478 HksFree(tagAead.data); in RunTestCase()
Dhks_aes_decrypt_mt.cpp473 HksBlob tagAead = { .size = AAD_SIZE, .data = (uint8_t *)HksMalloc(AAD_SIZE) }; in RunTestCase() local
474 ASSERT_NE(tagAead.data, nullptr); in RunTestCase()
476 …AesGcmEncrypt(paramInSet, &plainText, &cipherText, &authId, &tagAead), testCaseParams.encryptResul… in RunTestCase()
478 EXPECT_EQ(memcpy_s(cipherText.data + AAD_SIZE, AAD_SIZE, tagAead.data, AAD_SIZE), 0); in RunTestCase()
479 HksFree(tagAead.data); in RunTestCase()
Dopenssl_aes_helper.c234 const struct HksBlob *randomKey, const struct HksBlob *tagAead) in AesGcmEncrypt() argument
280 if (EVP_CIPHER_CTX_ctrl(ctx, EVP_CTRL_AEAD_GET_TAG, HKS_AE_TAG_LEN, tagAead->data) != 1) { in AesGcmEncrypt()

12